You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/334415461

Development of Electronic Document Archive Management System (EDAMS): A


Case Study of a University Registrar in the Philippines

Article · July 2019

CITATION READS

1 990

1 author:

Las Johansen Balios Caluza


Leyte Normal University
46 PUBLICATIONS   69 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

COVID-19 Pandemic Impact Analyses in the Philippines View project

LNU IT Researches View project

All content following this page was uploaded by Las Johansen Balios Caluza on 12 July 2019.

The user has requested enhancement of the downloaded file.


International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

Development of Electronic Document Archive Management System (EDAMS): A Case


Study of a University Registrar in the Philippines

Las Johansen B. Caluza


lasjohansencaluza@lnu.edu.ph
Leyte Normal University

ABSTRACT KEYWORDS: software development,


The traditional method of data storage has qualitative-case study, systems development
shown its impact in managing documents life cycle, Philippines.
from security, retrieval, and monitoring.
Many kinds of literature suggest that this 1. INTRODUCTION
approach would result in low job satisfaction Information systems have shown its
rating from its clients. Leyte Normal significant impact and importance in the
University’s Office of the Registrar is no digital age. A study reveals the benefits of
escape in this dilemma. In November 2013, having a digitmiesal process were fast and
the university experienced the strongest increased productivity, better monitoring,
typhoon ever recorded known as Haiyan high level of accuracy, and high level of
locally known as Yolanda. The consistency of information [1]. Many
archive/storage area of the Registrar was organizations are developing information
heavily affected were most of the documents systems designed specifically to facilitate
scattered and deteriorated. With this the sharing and integration of knowledge
experience, it is empirical to study to [2]. Despite the application of technologies,
provide a practical solution. The researcher there are still using the manual process of
utilized embedded single case study using data storage and retrieval which hinders the
thematic analysis in identifying the issues productivity, efficiency, and accuracy of
and coping strategies of the seven information and the quality service itself [3]
participants through in-depth interviews, identified four (4) problems in traditional
focus group discussion, and observation. methods of data storage such as it takes too
Moreover, the utilization of Systems long to acquire, it costs too much regarding
Development Life Cycle’s Sashimi model in maintenance, it is not scalable enough, and it
developing the software was carried out. requires too much commitment. The use of
The result revealed various issues and the manual process of data storage and
coping strategies mentioned by the traditional methods of data storage still exist
participants, from a limited storage area to in the university. As observed, many
difficulty in document retrieval and students transact the University Registrar
monitoring, and from the utilization of every day, which the Staff needs to attend
logbook to misclassification of records. this diverse client and request. The tendency
Finally, the results became the basis for of data filing, retrieval, and releasing of
developing the electronic document archive documents will be affected due to the
and management system (EDAMS). current set-up and processes they are
dealing. These gaps identified by the

106
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

literature and through observation are the the most appropriate methodology and the
primary concern of this study. most commonly used for systems
development analysis and design effort [5].
2. FRAMEWORK In support of the SDLC theory in developing
systems Samanga Amarasinghe [6] stated
Build automation theory is the act that “Software development is the process
of scripting or automating a wide variety of whereby one creates a set of instructions that
tasks. Build automation includes managing directs a computer to perform a given task(s)
the pre and post compile and link activities. in a particular order, using specified
There are many advantages in building hardware devices, memory allocation, and
automation systems. Among those were others.” SDLC has different types of models
improved product quality, accelerate the which software developers can choose from
compile and link processing, eliminate based on its usefulness and appropriateness
redundant tasks, minimize "bad builds," of the kind and purpose of the system to be
eliminate dependence on the main developed. Some of these were the Iterative
personnel. Also, have a history of builds and model, Waterfall model, Sashimi model,
releases to investigate issues, Save time and Spiral model, Fish Bone or Ishikawa
money - because of the reasons listed above. Diagram, and Prototyping. In Software
In Agile software development, having a Engineering, it is a part of an approach
computerized system or using called Software Requirement Analysis
working software allows us to measure how (SRA). This SRA presents the requirement
fast we produce results. Which in this case, gathering process that intensifies and
the theory would like to imply regarding focused specifically on software. In this
acceleration of the process, eliminating method, to further understand the nature of
redundant task, and save time and money in the software or program(s) to be developed,
general. the researcher or software engineer must
A systematic process through process understand the information domain for the
transformation from manual to computerize software, as well as required function,
is now the trends and keeps on moving behavior, performance, and interface [7].
forward. The use of Systems Development The theory mentioned serves as a vital
Life Cycle (SDLC) in developing systems benchmark towards the development of the
plays a vital role in information processing. system.
This theory was once compared the then and
now by Computer World and the article says 3. THE STUDY
“Software development consisted of a
programmer writing code to solve a problem This study utilized embedded single-case
or automate a procedure. Nowadays, study design using thematic analysis
systems are so big and complex that teams approach. Wherein the main instrument was
of architects, analysts, programmers, testers an interview conducted by the researcher,
and users must work together to create the including narratives of the participants about
millions of lines of custom-written code that the current situation in the workplace. As a
drive our enterprises [4]” In developing faculty of Information Technology and
Information Systems (IS) using SDLC are
107
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

Computer Education unit of the Leyte Waterfall Method in Systems Development


Normal University and the interest in Life Cycle (SDLC). A Lifecycle covers all
systems development and web engineering the stages of software from its inception
area, the researcher observed in the daily with requirements definition through to
transactions in the registrar office, the fielding and maintenance [8]. The use of
researcher became interested in creating a process model in SDLC is a practice by
system that the Registrar will benefit from which systems developers use and follows
and the university itself regarding quality before, during and after the development of
service. a system which will become a product called
This study would like to investigate software. With this project development, the
the process of document retrieval and record researcher uses the Sashimi model originated
keeping of the paper archives of the Leyte by Peter DeGrace and an additional
Normal University Registrar. Moreover, the feedback mechanism of Waterfall model.
researcher would like to develop a digital Determine
document archive of all pertinent student Requiremen
Design and
documents that were not found or included Coding
in the current Integrated School Information Testing
System (ISIS).
Implementat
Specifically, this study would like to ion
seek the following questions: Maintenance
1. What are the issues faced by the
office of the university registrar Figure 1: Sashimi and Waterfall Model
in dealing with documents
received from the students, Waterfall model in software development
monitoring, and retrieval? methodologies is one of the most widely
2. How do they cope up with these known and recognized methodologies. It
issues? suits for projects where the requirements are
3. Based on the results of this study, clear. Using the Waterfall software
what System can be developed to development life cycle, the implementation
solve their problem in data of the system preceded by requirements
management, monitoring, and definition, analysis, design and development
retrieval? [9]. The researcher uses this method because
the system will continuously improve for
En route to resolve the current further enhancement of other transactions
dilemma found in the university registrar into the system. In effect, a system for the
office, the researcher was requested by the university registrar will be developed and
university registrar to create a system that utilized.
will handle and listen to the workload of its
personnel. This study utilized embedded
single-case study using thematic analysis. In
the development of the system, the
researcher used the fusion of Iterative and 3.1 Determine Requirements and Analysis

108
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

requirements of the system, the researcher


This study was conducted at the Leyte uses programming languages such as
Normal University specifically the retrieval hypertext pre-processor (PHP) programming
of student request of pertinent records that as the main computer programming
were not included in the ISIS like document languages for web development system.
retrieval such as Transcript of Records PHP programming was created by Rasmus
(TOR), Diploma, Form 137, Form 138, Lendorf and was commonly known before
Honorable Dismissal, Good Moral, Birth as Personal Home Page and continuously
Certificate (NSO), Marriage Certificate improved by rewriting its parser by Zeev
(NSO), Certificate of Transfer Credentials, Suraski and Andi Gutmans and later
Informative Copy of Transcript, Original introduce to Zend scripting to deliver higher
Copy of TOR. Currently the university performance and supported by running
registrar process around an average of three under the web servers like Apache as a
hundred (300) request per day, whether the native server module [1e]. Other scripting
information found in the ISIS or the Student languages where JavaScript to facilitate the
Archives. This enormous number of data manipulation before its processing in
transactions per day will affect the service of the server-side scripting of the system. The
the university registrar. In effect, a request use of HTML5, which is the latest version of
of a particular clientele would take time due the Hyper Text Markup Language (HTML)
to this reason. for web development document creation and
Quantitative design using the descriptive the use of Cascading Style Sheet version 3
method and qualitative design was utilized (CSS3) as the latest version in web
by the researcher to determine the detailed designing. To enhance more the design and
responses of the respondents towards the system prototype the researcher uses Twitter
processes and transactions in the University Bootstrap created Mark Otto and Jacob to
Registrar’s Office, and a narrative response facilitate the look-and-feel of a system in
from the respondents was also conducted to web engineering. A bootstrap is an open-
gather more information. A survey source JavaScript Framework set up by the
questionnaire was used as its primary team at Twitter. It is a combination of
instrument and supported by interview and JavaScript, HTML5, and CSS3 to give an
observation to fill in other ambiguous easy creation of web design and
processes, transactions, and questions. functionalities of a website [12]. Through
the use of these latest software development
3.2 Design and Coding programming languages and scripting
languages, the development of systems will
In this phase of the spiral model, the be easy, manageable, and fast.
researcher starts the development of the
software using software engineering best 3.3 Testing
practices such as planning, requirements,
and analysis, change control, quality control, Since the researcher uses the sashimi model
progress and maintenance, and support after and obvious improvements to the waterfall
delivery of the product [10]. To facilitate the and other models in SDLC is during the

109
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

testing phase of the project. Testing occurs Compatibility issues were


as part of the development proves and then undertaken by the researcher by
again in the context of the deployment checking the hardware components
process. There are several different types of such as scanners that will be used for
testing; the researcher uses the following: document scanning to produce
System testing, Functional testing, electronic copy, server computer to
Performance testing, Loading testing, and serve as the controller of the system
Compatibility testing [9]. to avoid possible computer hacking
and virus attack. However, it is
3.3.1 Function Testing limited to network username and
Modules, subprograms, and other password regarding system’s
related system functionalities were protection. The client side computer
tested by the researcher/developer to is also tested to understand the
understand the risk part of the behavior further and its compatibility
program further and be able to regarding data processing.
respond necessary action or solution
to the problem identified by the 3.3.5 System Testing
researcher and the registrar’s The actual system testing and
personnel. determining the quality of clean data,
time processing, and overall
3.3.2 Performance Testing performance of the developed system
In this phase, the researcher does was performed in this phase. To be
some trial and observation of the able to accomplish this phase the
actual system performance during researcher together with a
Loading and Compatibility Testing. representative of the office of the
In which, observation in real time University Registrar conducted and
processing in this phase was followed software engineering
performed. techniques and approaches in testing
and quality assurance by passing
several testing phases mentioned
above such as Function,
3.3.3 Load Testing Performance, Loading, and
This testing phase includes actual Compatibility Testing.
document sample scanning and
feeding information to the system. 3.4 Implementation
The researcher observed how the After the software quality testing, transfer of
system behaves during and after technology will follow, wherein technology
information attachment and data transfer agreement is carried out between the
storage or saving to the system. researcher/developer of the software and
research and the implementing agency (the
3.3.4 Compatibility Testing university). R.A. 10055 also known as the

110
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

“Philippine Technology Transfer Act of and will be included in the proposal and will
2009” [13] says: consider the availability of the researcher
and the end user (registrar personnel). After
An act providing the framework and which, the installation process will follow.
support system for the ownership,
management, use, and 3.5 Maintenance
commercialization of intellectual Several stages performed in maintaining the
property generated from research system where some of which were
and development funded by prerequisites and required knowledge
government and for other purposes. involved, like PHP programming skills,
It is this premise that the technology networking skills, database management
developed by the research had to transfer to systems skills, and designing skills.
the university as a result of its Troubleshooting of the developed system is
investigations, being one (1) of the core easy provided that the above criteria be
functions of a government employee in the satisfied.
education sector. Moreover, a proposal to
conduct and transfer of technology by the 4. RESULTS AND DISCUSSIONS
researcher and the implementing agency or Theme 1: Issues Faced by the University
its sub-office (the Registrar) of the Registrar
university. The University, upon accepting
the said developed software, a memorandum The issues faced by the University Registrar
of agreement (MOA) will be arranged and showed in figure 2 illustrate through a
be signed by both parties. Technology qualitative schematic network. One
Transfer Arrangement refers to conventions identified issue was a limited storage area
or agreements. Technology transfer includes which due to limited space in the university
renewals thereof, including the transfer of and the effect of natural disasters like
systematic knowledge for the manufacture typhoon, earthquake, and fire. Recently, the
of a product. It is also the transfer of the university experienced the strongest typhoon
application process, or rendering of a ever recorded with international name
service, including management contracts; “Super Typhoon Haiyan” that destroyed
and the transfer, assignment or licensing of almost 90% of infrastructures like buildings
all forms of intellectual property rights, in the university resulting to heavy damages
including licensing of computer software of storage area and the office of the
except computer software developed for the university registrar.
mass market [14]. Training will also be done

111
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

Document
Limited space in the Misclassification
University Difficulty in
document
Misplacement of monitoring
Documents

Limited storage
area Document Security

Termite and Pest


Difficulty in
Attack
Document
Natural disaster like Retrieval
Typhoons,
Earthquake, and Document
Fire Degradation

Theme 2: Coping Strategies of the


Figure 2: Schematic Network of Issues University Registrar
Faced by the University Registrar
Coping strategies identified and mentioned
According to the Staff of the University during the interview and observation with
Registrar during the interview, “Most of the the participants was established. Among
documents in the storage area were wet and those coping strategies were asking support
disarranged due to strong winds and heavy from the administration through the budget
rain. Some of the documents were blown allocation of requests through Annual
away that causes to misclassification and Procurement Plan (APP) of the University.
degradation of records.” Having a limited Through APP, the office was able to apply
storage area causes document for maintenance technologies and
misclassification, misplacement of infrastructure. As mentioned by the
documents, document security is at stake, participant, she said: “The University always
termite and pest attack, and document has strong support to the office through
degradation. The following causes APP, where all requests were given like air
mentioned above would result in difficulty in con, shelves, glass separator and protector,
the document monitoring, difficulty in individual enveloped filing and a lot more.”
document retrieval, and contrariwise. These However, the release of these requests also
issues give dilemmas to the Office takes time. That hinders the efficiency of the
considering that the records they are keeping office, with this situation that office resorted
are student’s records and other pertinent to using Log book of all documents received
information about the students that in the and released to the stakeholder. Using the
future these documents will be requested by log book as attested by the participants
the stakeholder. would result in improper filing and would
take time of releasing documents.

112
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

Take time in
releasing
Log Book
Improper filing
Admin support Maintenance
through Budget Technologies and
Infrastructure

Periodic Underman Take time in


maintenance (clean- releasing documents
up, checking)

Figure 3: Schematic Network of Coping


Strategies of the University Registrar

Further, despite this budget support, the


office is still lacking Staff to help them
manage stakeholder’s request, especially
that the University is getting bigger in
student population both in the
Undergraduate and Graduate Students.
According to the participant “We are
under man, we lack Staffs in the office to
help us in managing the Office, that is
why we have periodic maintenance in the
storage area and rotational assignment
as to who will be assigned in cleaning Figure 4: Login Form
and checking the documents in the
storage area.” Being under-staffing
would result in inefficiency and
unsatisfactory performance of the office
and would affect the service quality
render to the stakeholders like graduates,
parents, the students itself, and others
transacting the office.

Developed Software
Figure 4 shows the Login form of the
system. This form is the primary security
mechanism of the system against
intrusion or unauthorized user. Figure 5: Adding New Record

113
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

Figure 5 shows adding new record to the


system. This is where the user of the
system input basic information about the
owner of the document received from the
client like NSO Birth Certificate, Form
137, Honorable dismissal, TOR, and
others.

Figure 6 shows searching student’s records


through Student ID or Family Name also
the result of the search key. This
mechanism is for fast searching and
retrieval of documents of a specific
student or graduate.

Figure 7 shows the searching list form


Figure 6: Search Result indicating a specific list of student’s records

specified by the user by student number


and by year (from – to). This form is
another way of generating reports by a
list of students with submitted pertinent
and required documents of the University
through the Office of the Registrar.

Figure 8 revealed the result from figure 7


showing the search list result from
displaying the result by Graduate or
Figure 7: Searching List Form
Undergraduate by Program, Sex, Document
Status, Enrolled as, and a list of the available
year(s) per program.

Figure 9 shows a sample list report


generated from figure 8 by program
showing the Student Number, the name
of the Student, Sex, Document Status
(complete or incomplete), Enrolled as
(regular or irregular), and Enrollment
Status (Active or Inactive). The result
showed in alphabetical order of Family
Name and arranged using pagination.
Figure 8: Searching List Result Form

114
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

Figure 10 is another report generated


from the system showing the sample
Monitoring Form. This form shows
the Student Number, Student’s Name,
mandatory document status, Optional
documents and status, Monitoring
Remarks, and Status of the Student.
This form helps a lot to the Office
because this is where they will see and
monitor the required documents,
especially when the student is about to
graduate. Through this report, the
Office can easily provide and quick
feedback to the student as to what
documents are still lacking.

Figure 11 shows form in managing the


system also known as the Maintenance
Form where adding new programs,
document type, a list of programs, and
a list of documents currently saved in
Figure 9: Sample List Report Result the system. Also, this form performs
editing and deleting programs and
documents.

Figure 11: Maintenance Form


Figure 10: Sample Monitoring Form Generator 5.0 CONCLUSION

115
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

In developing systems, it follows [3]. Keating, C. (2016). 4 Problem with


specific processes to produce the desired Traditional Methods of Data
output. In this case, the issues faced by the Storage. Zadara Storage Blog.
office also revealed, such as limited storage Retrieved on 7/20/2017 from
area, misclassification, misplacement of the https://www.zadarastorage.com/blog/
document, document security, termite, and industry-insights/4-problems-
pest attacked, difficulty in monitoring, and traditional-methods-data-storage/
difficulty in document retrieval. On the [4]. Kay, R. (2002). QuickStudy: system
other hand, several coping strategies were development life
also identified by the participants like asking cycle. Computerworld, May, 14.
budgetary support, the use of a log book, Retrieve on 6/10/2017 from
periodic maintenance, and the use of http://www.computerworld.com/s/art
maintenance technologies and infrastructure. icle/71151/System_Development_Li
However, despite these coping strategies, fe_Cycle?pageNumber=1
drawbacks are still present like releasing on [5]. Hoffer, J. A., George, J. F., &
a budget take time, improper still happens, Valacich, J. S. (1996). Modern
undermanned, and releasing of documents to Systems Analysis and Design. Rizal,
the stakeholders still takes time. As a result, Philippines. Jemma, INC.
the development of an electronic document [6]. Amarasinghe, S. (n.d.). Software
archiving management system was made to Development Life Cycle – Samanga
aid the problems faced by the Office. Amarasinghe. [Powerpoint
Finally, a follow-up study must be Presentation]. Retrieve on 7/10/2017
conducted to measure the effectiveness of from
the system, the performance of the scheme, http://www.academia.edu/2394463/S
and acceptability of the developed system. oftware_Development_Life_Cycle_-
_Samanga_Amarasinghe
6.0 REFERENCES [7]. Pressman, R. S., & Ince, D.
(1992). Software engineering: a
[1]. Kia, M., Shayan, E., & Ghotb, F. practitioner's approach (Vol. 5). New
(2000). The importance of York: McGraw-hill. Retrieve on
information technology in port 5/12/2017 from
terminal operations. International http://guideforengineers.com/wordpr
Journal of Physical Distribution & ess/wp-
Logistics Management, 30(3/4), 331- content/uploads/2009/10/se_notes.pd
344. f
[2]. Alavi, M., & Leidner, D. E. (1999). [8]. Ruparelia, N. B. (2010). Software
Knowledge management systems: development lifecycle models. ACM
issues, challenges, and SIGSOFT Software Engineering
benefits. Communications of the Notes, 35 (3), 8-13.
AIS, 1(2es), 1. [9]. Rising, J. (2009). Sashimi Waterfall
Software Development Process.
Managed Mayhem. Retrieve on

116
International Journal of Digital Information and Wireless Communications (IJDIWC) 7(2): 106-117
The Society of Digital Information and Wireless Communications, 2017 ISSN: 2225-658X (Online); ISSN 2412-6551 (Print)

5/10/2017 from
http://www.managedmayhem.com/2
009/05/06/sashimi-waterfall-
software-development-process/
[10]. Jones, C. (2010). Software
Engineering Best Practices: Lessons
from Successful Projects in the Top
Companies. New York. The
McGraw-Hill Companies.
[11]. PHP Manual. (n.d.). A Brief History
of PHP. Retrieve on 9/8/2013 from
http://scholar.lib.vt.edu/manuals/php
3.0.6/intro-history.html
[12]. Markle, B. (2013). What is
Bootstrap?. Support Center. Retrieve
on 6/9/2017 from
http://www.inmotionhosting.com/su
pport/edu/joomla-3/using-
bootstrap/what-is-bootstrap
[13]. Republic Act. 10055 of 2009.
Retrieved on 5/15/2017 from

public_acts/ra%2010055.pdf
[14]. IPOPHIL. (nd). About Technology
Transfer Agreement. Retrieved on
6/16/2017 from
http://www.ipophil.gov.ph/index.php
/services/ip-business2/technology-
transfer-arrangement

117

View publication stats

You might also like